HTTP/2 and SPDY Request Vulnerability in F5 BIG-IP Systems
CVE-2017-6155
Key Information:
- Vendor
- F5
- Status
- Vendor
- CVE Published:
- 13 April 2018
Summary
A vulnerability in F5 BIG-IP systems arises from the processing of malformed SPDY or HTTP/2 requests, potentially leading to service disruption for traffic managed by the Traffic Management Microkernel (TMM). It occurs when these profiles are assigned to a virtual server, exposing the data plane to risks when handling non-compliant requests. This vulnerability does not affect the control plane, ensuring limited exposure. For detailed information, refer to the supporting documentation.
Affected Version(s)
BIG-IP (LTM, AAM, AFM, APM, ASM, Edge Gateway, Link Controller, PEM, PSM, WebAccelerator, WebSafe) 13.0.0
BIG-IP (LTM, AAM, AFM, APM, ASM, Edge Gateway, Link Controller, PEM, PSM, WebAccelerator, WebSafe) 12.0.0-12.1.3.1
BIG-IP (LTM, AAM, AFM, APM, ASM, Edge Gateway, Link Controller, PEM, PSM, WebAccelerator, WebSafe) 11.6.0-11.6.2
References
CVSS V3.1
Timeline
Vulnerability published
Vulnerability Reserved